On 11/21/13 16:31, Vladimir 'phcoder' Serbinenko wrote:
>
> Why do you need offset and size options? keyfile option should be
> repeteable. The whole array would be passed down and file would be
> opened instead before reading password and concatebated with it unless
> --no-password was specified as well. If you have remaining questions
> feel free to ask here or on IRC.
>
See man 8 cryptsetup:
 /      --keyfile-offset value//
//              Skip value bytes at the beginning of the key file. 
Works with all commands that accepts key files.//
//
//       --keyfile-size, -l value//
//              Read a maximum of value bytes from the key file. 
Default is to read the whole file up to the compiled-in maximum that can
be queried with --help. Supplying more data than the compiled-in maximum
aborts the operation.//
//
//              This option is useful to cut trailing newlines, for
example. If --keyfile-offset is also given, the size count starts after
the offset.  Works with all commands that accepts key files./


> On Nov 20, 2013 12:43 AM, "Ralf Ramsauer"
> <ralf+g...@ramses-pyramidenbau.de
> <mailto:ralf%2bg...@ramses-pyramidenbau.de>> wrote:
>
>     Hi,
>
>     yesterday I realised, that GRUB is already supporting LUKS and even
>     simple DSA signature checking.
>
>     I was thinking about the following setup:
>       - fully encrypted harddisk (LUKS) (incl. rootfs).
>       - no bootloader on harddisk
>       - kernel + initrd inside encrypted partition
>       - optionally: signatures of the kernel + initrd
>
>     For "trusted" booting, I thought about an USB stick, that just
>     includes
>     GRUB, a public key for verification and a keyfile for LUKS.
>     Using that setup, no password input would be required during boot. The
>     USB stick can be considered as "trusted environment".
>
>     Unfortunately, GRUB doesn't support keyfile for Luks up to now. As I'm
>     quite familiar with dm-crypt and LUKS I tried to implement the keyfile
>     feature to GRUB.
>     After spending several hours trying to get a deeper insight into the
>     GRUB internas I finally resigned, as I was missing documentation on
>     several things...
>
>     I was very confused about the way how GRUB2 is handling its
>     modules and
>     about the strategies how functions are exactly called.
>     The aim is to implement three additional options to cryptodisk.c resp.
>     luks.c:
>      -k keyfile [e.g. (hd2,msdos3)/mysecretkey]
>      -o keyfile offset [optional, default: 0]
>      -s keyfile size [optional, default: keyfilesize]
>
>     Using LUKS, a keyfile can simply be treated like a passphrase, which
>     basically is already implemented.
>
>     I would appreciate, if perhaps someone of you could help me with
>     this issue.
>
>     Thanks in advance!
>       Ralf
>
>     --
>     Ralf Ramsauer
>
>     PGP: 0x8F10049B
>
>
>     _______________________________________________
>     Grub-devel mailing list
>     Grub-devel@gnu.org <mailto:Grub-devel@gnu.org>
>     https://lists.gnu.org/mailman/listinfo/grub-devel
>
>
>
> _______________________________________________
> Grub-devel mailing list
> Grub-devel@gnu.org
> https://lists.gnu.org/mailman/listinfo/grub-devel


-- 
Ralf Ramsauer

PGP: 0x8F10049B

_______________________________________________
Grub-devel mailing list
Grub-devel@gnu.org
https://lists.gnu.org/mailman/listinfo/grub-devel

Reply via email to